aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
authorSimon L. B. Nielsen <simon@FreeBSD.org>2005-10-09 21:03:07 +0000
committerSimon L. B. Nielsen <simon@FreeBSD.org>2005-10-09 21:03:07 +0000
commit0fd61e032bf0070515c63ba25b50d1c569b63847 (patch)
treead87b5aec63683160899512dbdd788a6173121b6 /security/vuxml/vuln.xml
parenteb338f51159e936c46a34882fa493b4d234a1851 (diff)
downloadports-0fd61e032bf0070515c63ba25b50d1c569b63847.tar.gz
ports-0fd61e032bf0070515c63ba25b50d1c569b63847.zip
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml11
1 files changed, 6 insertions, 5 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 251093352909..c1a5610d05a9 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -47,17 +47,18 @@ Note: Please add new entries to the beginning of this file.
<p>Gentoo Linux Security Advisory reports:</p>
<blockquote cite="http://www.gentoo.org/security/en/glsa/glsa-200510-08.xml">
<p>Ulf Harnhammar discovered a format string bug in the routines
- handling CDDB server response contents.</p>
- <p>An attacker could submit malicious information about an audio
- CD to a public CDDB server (or impersonate a public CDDB server).
- When the victim plays this CD on a multimedia frontend relying
- on xine-lib, it could end up executing arbitrary code.</p>
+ handling CDDB server response contents.</p>
+ <p>An attacker could submit malicious information about an audio
+ CD to a public CDDB server (or impersonate a public CDDB server).
+ When the victim plays this CD on a multimedia frontend relying
+ on xine-lib, it could end up executing arbitrary code.</p>
</blockquote>
</body>
</description>
<references>
<cvename>CAN-2005-2967</cvename>
<url>http://www.gentoo.org/security/en/glsa/glsa-200510-08.xml</url>
+ <url>http://xinehq.de/index.php/security/XSA-2005-1</url>
</references>
<dates>
<discovery>2005-10-08</discovery>